Iran Open Source (IOS)
بعد شش ماه توسعه بالاخره اوبونتو 18.10 منتشر شد. www.ubuntu.com
👉 Download Kubuntu (https://kubuntu.org/) 18.10
👉 Download Lubuntu (https://lubuntu.me/) 18.10
👉 Download Ubuntu Budgie (https://ubuntubudgie.org/) 18.10
👉 Download Ubuntu Kylin (http://www.ubuntukylin.com/index.php?lang=en) 18.10
👉 Download Ubuntu Mate (https://ubuntu-mate.org/) 18.10
👉 Download Ubuntu Studio (https://ubuntustudio.org/) 18.10
👉 Download Xubuntu (https://xubuntu.org/) 18.10
👉 Download Lubuntu (https://lubuntu.me/) 18.10
👉 Download Ubuntu Budgie (https://ubuntubudgie.org/) 18.10
👉 Download Ubuntu Kylin (http://www.ubuntukylin.com/index.php?lang=en) 18.10
👉 Download Ubuntu Mate (https://ubuntu-mate.org/) 18.10
👉 Download Ubuntu Studio (https://ubuntustudio.org/) 18.10
👉 Download Xubuntu (https://xubuntu.org/) 18.10
Iran Open Source (IOS)
@iranopensource 🐧
Practical Linux Security Cookbook is published by Packt Publishing in April 2016. This book has 276 pages in English, ISBN-13 978-1785286421.
With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system.
Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure.
With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security.
With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems.
What you will learn
Learn about various vulnerabilities and exploits in relation to Linux systems
Configure and build a secure kernel and test it
Learn about file permissions and security and how to securely modify files
Explore various ways to authenticate local users while monitoring their activities.
Authenticate users remotely and securely copy files on remote systems
Review various network security methods including firewalls using iptables and TCP Wrapper
Explore various security tools including Port Sentry, Squid Proxy, Shorewall, and many more
Understand Bash vulnerability/security and patch management
With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system.
Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure.
With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security.
With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems.
What you will learn
Learn about various vulnerabilities and exploits in relation to Linux systems
Configure and build a secure kernel and test it
Learn about file permissions and security and how to securely modify files
Explore various ways to authenticate local users while monitoring their activities.
Authenticate users remotely and securely copy files on remote systems
Review various network security methods including firewalls using iptables and TCP Wrapper
Explore various security tools including Port Sentry, Squid Proxy, Shorewall, and many more
Understand Bash vulnerability/security and patch management
Iran Open Source (IOS)
@iranopensource 🐧
Book Details
ISBN 139781788620307
Donald A. Tevault
January 2018
Paperback 376 pages
Book Denoscription
This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently.
By the end of this book, you will be confident in delivering a system that will be much harder to compromise.
Table of Contents
1: Running Linux in a Virtual Environment
2: Securing User Accounts
3: Securing Your Server with a Firewall
4: Encrypting and SSH Hardening
5: Mastering Discretionary Access Control
6: Access Control Lists and Shared Directory Management
7: Implementing Mandatory Access Control with SELinux and AppArmor
8: Scanning, Auditing, and Hardening
9: Vulnerability Scanning and Intrusion Detection
10: Security Tips and Tricks for the Busy Bee
What You Will Learn
Use various techniques to prevent intruders from accessing sensitive data
Prevent intruders from planting malware, and detect whether malware has been planted
Prevent insiders from accessing data that they aren’t authorized to access
Do quick checks to see whether a computer is running network services that it doesn’t need to run
Learn security techniques that are common to all Linux distros, and some that are distro-specific
ISBN 139781788620307
Donald A. Tevault
January 2018
Paperback 376 pages
Book Denoscription
This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently.
By the end of this book, you will be confident in delivering a system that will be much harder to compromise.
Table of Contents
1: Running Linux in a Virtual Environment
2: Securing User Accounts
3: Securing Your Server with a Firewall
4: Encrypting and SSH Hardening
5: Mastering Discretionary Access Control
6: Access Control Lists and Shared Directory Management
7: Implementing Mandatory Access Control with SELinux and AppArmor
8: Scanning, Auditing, and Hardening
9: Vulnerability Scanning and Intrusion Detection
10: Security Tips and Tricks for the Busy Bee
What You Will Learn
Use various techniques to prevent intruders from accessing sensitive data
Prevent intruders from planting malware, and detect whether malware has been planted
Prevent insiders from accessing data that they aren’t authorized to access
Do quick checks to see whether a computer is running network services that it doesn’t need to run
Learn security techniques that are common to all Linux distros, and some that are distro-specific
Iran Open Source (IOS)
@iranopensource 🐧
Copyright 2019
Price: $64.00
Pages: 704
Edition: 1st
By: William Rothwell, Denise Kinsey
Published: Jul 26, 2018 by Pearson IT Certification
ISBN-10: 0-13-485302-4
ISBN-13: 978-0-13-485302-4
ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA–IN ONE BOOK
From the basics to advanced techniques: no Linux security experience necessary
Realistic examples & step-by-step activities: practice hands-on without costly equipment
The perfect introduction to Linux-based security for all students and IT professionals
Linux distributions are widely used to support mission-critical applications and manage crucial data. But safeguarding modern Linux systems is complex, and many Linux books have inadequate or outdated security coverage.
Linux Essentials for Cybersecurity is your complete solution. Leading Linux certification and security experts William “Bo” Rothwell and Dr. Denise Kinsey introduce Linux with the primary goal of enforcing and troubleshooting security. Their practical approach will help you protect systems, even if one or more layers are penetrated.
First, you’ll learn how to install Linux to achieve optimal security upfront, even if you have no Linux experience. Next, you’ll master best practices for securely administering accounts, devices, services, processes, data, and networks. Then, you’ll master powerful tools and automated noscripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more.
To help you earn certification and demonstrate skills, this guide covers many key topics on CompTIA Linux+ and LPIC-1 exams. Everything is organized clearly and logically for easy understanding, effective classroom use, and rapid on-the-job training.
LEARN HOW TO:
Review Linux operating system components from the standpoint of security
Master key commands, tools, and skills for securing Linux systems
Troubleshoot common Linux security problems, one step at a time
Protect user and group accounts with Pluggable Authentication
Modules (PAM), SELinux, passwords, and policies
Safeguard files and directories with permissions and attributes
Create, manage, and protect storage devices: both local and networked
Automate system security 24/7 by writing and scheduling noscripts
Maintain network services, encrypt network connections, and secure network-accessible processes
Examine which processes are running–and which may represent a threat
Use system logs to pinpoint potential vulnerabilities
Keep Linux up-to-date with Red Hat or Debian software management tools
Modify boot processes to harden security
Master advanced techniques for gathering system information
Price: $64.00
Pages: 704
Edition: 1st
By: William Rothwell, Denise Kinsey
Published: Jul 26, 2018 by Pearson IT Certification
ISBN-10: 0-13-485302-4
ISBN-13: 978-0-13-485302-4
ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA–IN ONE BOOK
From the basics to advanced techniques: no Linux security experience necessary
Realistic examples & step-by-step activities: practice hands-on without costly equipment
The perfect introduction to Linux-based security for all students and IT professionals
Linux distributions are widely used to support mission-critical applications and manage crucial data. But safeguarding modern Linux systems is complex, and many Linux books have inadequate or outdated security coverage.
Linux Essentials for Cybersecurity is your complete solution. Leading Linux certification and security experts William “Bo” Rothwell and Dr. Denise Kinsey introduce Linux with the primary goal of enforcing and troubleshooting security. Their practical approach will help you protect systems, even if one or more layers are penetrated.
First, you’ll learn how to install Linux to achieve optimal security upfront, even if you have no Linux experience. Next, you’ll master best practices for securely administering accounts, devices, services, processes, data, and networks. Then, you’ll master powerful tools and automated noscripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more.
To help you earn certification and demonstrate skills, this guide covers many key topics on CompTIA Linux+ and LPIC-1 exams. Everything is organized clearly and logically for easy understanding, effective classroom use, and rapid on-the-job training.
LEARN HOW TO:
Review Linux operating system components from the standpoint of security
Master key commands, tools, and skills for securing Linux systems
Troubleshoot common Linux security problems, one step at a time
Protect user and group accounts with Pluggable Authentication
Modules (PAM), SELinux, passwords, and policies
Safeguard files and directories with permissions and attributes
Create, manage, and protect storage devices: both local and networked
Automate system security 24/7 by writing and scheduling noscripts
Maintain network services, encrypt network connections, and secure network-accessible processes
Examine which processes are running–and which may represent a threat
Use system logs to pinpoint potential vulnerabilities
Keep Linux up-to-date with Red Hat or Debian software management tools
Modify boot processes to harden security
Master advanced techniques for gathering system information
Iran Open Source (IOS)
شاید برای شما همیشه استفاده از Iconهای خاص شرکت VMware که در تصاویر کتاب ها و اسلایدهای این شرکت مشاهده میکنید در طراحی زیرساخت های مجازی تان به عنوان یک چالش بوده است!!!
EUC Visio Stencils 2018.vss
16.3 MB
برای حل این مشکل میتوانید از بسته VMware EUC Visio Stencils نسخه 2018 آن در نرم افزار MS Visio استفاده نمایید.
Iran Open Source (IOS)
ایزابل چیست؟
ایزابل یک نرم افزار تلفنی رایگان و متن باز است که هسته تلفنی آن Asterisk می باشد. ایزابل تعداد زیادی نرم افزار جانبی را در بر گرفته و باعث شده است که حتی افرادی که دانش نسبتاً کمی از VOIP و شبکه دارند به راحتی بتوانند یک مرکز تماس حرفه ای برای سازمان خود راه اندازی کنند.
استریسک ( Asterisk ) محبوب ترین نرم افزار تلفنی در سال ۱۹۹۹ توسط مارک اسپنسر ( Mark Spencer ) بنیانگذار شرکت دیجیوم برای سیستم عامل لینوکس تولید شد ، هر جند این نرم افزار بسیار کار آمد و قدرتمند هست ولی به دلیل عدم داشتن واسط کاربری گرافیکی کار با آن بسیار دشوار است و صرفا متخصصین خبره می توانند ار آن استفاده کنند . ولی از انجایی که این نرم افزار به صورت متن باز و و رایگان ارائه می شود شرکت های دیگر دست به کار شدند و و شروع به تولید واسط کاربری برای استریسک کردند .
واسط های کاربری استریسک
از واسط های کاربری استریسک می توان به موارد زیر اشاره کرد :
4PSA VoipNow
ansitel
AsteriskNOW
Astimax
Be IP IPBX
Elastix
FreePBX
استریسک ( Asterisk ) محبوب ترین نرم افزار تلفنی در سال ۱۹۹۹ توسط مارک اسپنسر ( Mark Spencer ) بنیانگذار شرکت دیجیوم برای سیستم عامل لینوکس تولید شد ، هر جند این نرم افزار بسیار کار آمد و قدرتمند هست ولی به دلیل عدم داشتن واسط کاربری گرافیکی کار با آن بسیار دشوار است و صرفا متخصصین خبره می توانند ار آن استفاده کنند . ولی از انجایی که این نرم افزار به صورت متن باز و و رایگان ارائه می شود شرکت های دیگر دست به کار شدند و و شروع به تولید واسط کاربری برای استریسک کردند .
واسط های کاربری استریسک
از واسط های کاربری استریسک می توان به موارد زیر اشاره کرد :
4PSA VoipNow
ansitel
AsteriskNOW
Astimax
Be IP IPBX
Elastix
FreePBX